Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-01-2023 11:13
Static task
static1
Behavioral task
behavioral1
Sample
synapse-v2-launcher-12-5-22.zip
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
synapse-v2-launcher-12-5-22.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
README.txt
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
README.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Synapse Launcher.exe
Resource
win7-20220812-en
General
-
Target
Synapse Launcher.exe
-
Size
788KB
-
MD5
20e1eb6b9b733bbd26ac8be5be603de2
-
SHA1
36beefc2467d94b5ec9ae843b2bb099898581bed
-
SHA256
73af760ad2ffdd931210079ef4b719a1a8c41a864e7d0a39faa5c1783fb140d6
-
SHA512
d486fc560f0f6d94428b58ae041a17053659e78c49fe9154ca9e642d692da43aeb7dd3f03b1aeb428ea398bdbdfab743960c2f0fa885cd97bc31655be2e42e0b
-
SSDEEP
12288:GoK0iEH0u6YNNCObkXxHDc/n3jUOSpUMh:nipzXonoOSpUMh
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
LxPRtlQa7cc.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LxPRtlQa7cc.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
wjp4zkmBrUCE2.binLxPRtlQa7cc.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exepid Process 1612 wjp4zkmBrUCE2.bin 916 LxPRtlQa7cc.exe 1704 CefSharp.BrowserSubprocess.exe 1772 CefSharp.BrowserSubprocess.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
LxPRtlQa7cc.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LxPRtlQa7cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LxPRtlQa7cc.exe -
Loads dropped DLL 29 IoCs
Processes:
Synapse Launcher.exewjp4zkmBrUCE2.binLxPRtlQa7cc.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exepid Process 2032 Synapse Launcher.exe 1612 wjp4zkmBrUCE2.bin 916 LxPRtlQa7cc.exe 916 LxPRtlQa7cc.exe 916 LxPRtlQa7cc.exe 916 LxPRtlQa7cc.exe 916 LxPRtlQa7cc.exe 916 LxPRtlQa7cc.exe 916 LxPRtlQa7cc.exe 916 LxPRtlQa7cc.exe 916 LxPRtlQa7cc.exe 916 LxPRtlQa7cc.exe 916 LxPRtlQa7cc.exe 1704 CefSharp.BrowserSubprocess.exe 1704 CefSharp.BrowserSubprocess.exe 1704 CefSharp.BrowserSubprocess.exe 1704 CefSharp.BrowserSubprocess.exe 1704 CefSharp.BrowserSubprocess.exe 1704 CefSharp.BrowserSubprocess.exe 1704 CefSharp.BrowserSubprocess.exe 1704 CefSharp.BrowserSubprocess.exe 916 LxPRtlQa7cc.exe 1772 CefSharp.BrowserSubprocess.exe 1772 CefSharp.BrowserSubprocess.exe 1772 CefSharp.BrowserSubprocess.exe 1772 CefSharp.BrowserSubprocess.exe 1772 CefSharp.BrowserSubprocess.exe 1772 CefSharp.BrowserSubprocess.exe 1772 CefSharp.BrowserSubprocess.exe -
Processes:
LxPRtlQa7cc.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LxPRtlQa7cc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
LxPRtlQa7cc.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString LxPRtlQa7cc.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 LxPRtlQa7cc.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
LxPRtlQa7cc.exedescription ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS LxPRtlQa7cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor LxPRtlQa7cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSReleaseDate LxPRtlQa7cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer LxPRtlQa7cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName LxPRtlQa7cc.exe -
Processes:
Synapse Launcher.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Synapse Launcher.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 Synapse Launcher.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Synapse Launcher.exewjp4zkmBrUCE2.binLxPRtlQa7cc.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exepid Process 2032 Synapse Launcher.exe 1612 wjp4zkmBrUCE2.bin 916 LxPRtlQa7cc.exe 916 LxPRtlQa7cc.exe 1704 CefSharp.BrowserSubprocess.exe 1704 CefSharp.BrowserSubprocess.exe 1704 CefSharp.BrowserSubprocess.exe 1772 CefSharp.BrowserSubprocess.exe 1772 CefSharp.BrowserSubprocess.exe 1772 CefSharp.BrowserSubprocess.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Synapse Launcher.exewjp4zkmBrUCE2.binLxPRtlQa7cc.exeCefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exedescription pid Process Token: SeDebugPrivilege 2032 Synapse Launcher.exe Token: SeDebugPrivilege 1612 wjp4zkmBrUCE2.bin Token: SeDebugPrivilege 916 LxPRtlQa7cc.exe Token: SeDebugPrivilege 1704 CefSharp.BrowserSubprocess.exe Token: SeDebugPrivilege 1772 CefSharp.BrowserSubprocess.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
Synapse Launcher.exewjp4zkmBrUCE2.binLxPRtlQa7cc.exedescription pid Process procid_target PID 2032 wrote to memory of 1612 2032 Synapse Launcher.exe 28 PID 2032 wrote to memory of 1612 2032 Synapse Launcher.exe 28 PID 2032 wrote to memory of 1612 2032 Synapse Launcher.exe 28 PID 2032 wrote to memory of 1612 2032 Synapse Launcher.exe 28 PID 2032 wrote to memory of 1612 2032 Synapse Launcher.exe 28 PID 2032 wrote to memory of 1612 2032 Synapse Launcher.exe 28 PID 2032 wrote to memory of 1612 2032 Synapse Launcher.exe 28 PID 1612 wrote to memory of 916 1612 wjp4zkmBrUCE2.bin 29 PID 1612 wrote to memory of 916 1612 wjp4zkmBrUCE2.bin 29 PID 1612 wrote to memory of 916 1612 wjp4zkmBrUCE2.bin 29 PID 1612 wrote to memory of 916 1612 wjp4zkmBrUCE2.bin 29 PID 1612 wrote to memory of 916 1612 wjp4zkmBrUCE2.bin 29 PID 1612 wrote to memory of 916 1612 wjp4zkmBrUCE2.bin 29 PID 1612 wrote to memory of 916 1612 wjp4zkmBrUCE2.bin 29 PID 916 wrote to memory of 1704 916 LxPRtlQa7cc.exe 30 PID 916 wrote to memory of 1704 916 LxPRtlQa7cc.exe 30 PID 916 wrote to memory of 1704 916 LxPRtlQa7cc.exe 30 PID 916 wrote to memory of 1704 916 LxPRtlQa7cc.exe 30 PID 916 wrote to memory of 1704 916 LxPRtlQa7cc.exe 30 PID 916 wrote to memory of 1704 916 LxPRtlQa7cc.exe 30 PID 916 wrote to memory of 1704 916 LxPRtlQa7cc.exe 30 PID 916 wrote to memory of 1772 916 LxPRtlQa7cc.exe 31 PID 916 wrote to memory of 1772 916 LxPRtlQa7cc.exe 31 PID 916 wrote to memory of 1772 916 LxPRtlQa7cc.exe 31 PID 916 wrote to memory of 1772 916 LxPRtlQa7cc.exe 31 PID 916 wrote to memory of 1772 916 LxPRtlQa7cc.exe 31 PID 916 wrote to memory of 1772 916 LxPRtlQa7cc.exe 31 PID 916 wrote to memory of 1772 916 LxPRtlQa7cc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\bin\wjp4zkmBrUCE2.bin"bin\wjp4zkmBrUCE2.bin"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\bin\LxPRtlQa7cc.exe"bin\LxPRtlQa7cc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\bin\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\Temp\bin\CefSharp.BrowserSubprocess.exe" --type=gpu-process --field-trial-handle=3020,5174035635764957260,6048953749857500432,131072 --enable-features=CastMediaRouteProvider --disable-features=OutOfBlinkCors --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\bin\debug.log" --lang=en-US --cefsharpexitsub --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --log-file="C:\Users\Admin\AppData\Local\Temp\bin\debug.log" --mojo-platform-channel-handle=3048 /prefetch:2 --host-process-id=9164⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\bin\CefSharp.BrowserSubprocess.exe"C:\Users\Admin\AppData\Local\Temp\bin\CefSharp.BrowserSubprocess.exe" --type=utility --field-trial-handle=3020,5174035635764957260,6048953749857500432,131072 --enable-features=CastMediaRouteProvider --disable-features=OutOfBlinkCors --lang=en-US --service-sandbox-type=network --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\bin\debug.log" --lang=en-US --cefsharpexitsub --log-file="C:\Users\Admin\AppData\Local\Temp\bin\debug.log" --mojo-platform-channel-handle=3232 /prefetch:8 --host-process-id=9164⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912KB
MD567e9fdff12286ad0ff11aa7e8a7775d9
SHA1245ec015e953bb395cf5d1e4f54804166daeaf68
SHA256b184f42ad13993a963700ad40400d401e398a46f72056f5907b6acdff986c63d
SHA51242c068e0b157fa5bd9ec9be977c1ec44712fc78909efb64961dc1e34d6c7fccc7af6bb685e847f32da9fe9124a215ad3adea08317279851c8ffd2761a3b47870
-
Filesize
7KB
MD51687e4430649fdd4fde98a120f992836
SHA1fd7227e15928bee5335772cd72dba0047f6d06ce
SHA2565b0d7eec5ae0f5af562ec02611dbaadbfba6b308ba0345cb19b30a0a84f937a7
SHA512a6c3b0db67a4f27a37ee2b9302752c2094015bcca9a006561805fbe93f178e163e47501bc3c2c120cb8469a7985d69533020f9d736e6409e31fdc1084e279f4d
-
Filesize
7KB
MD51687e4430649fdd4fde98a120f992836
SHA1fd7227e15928bee5335772cd72dba0047f6d06ce
SHA2565b0d7eec5ae0f5af562ec02611dbaadbfba6b308ba0345cb19b30a0a84f937a7
SHA512a6c3b0db67a4f27a37ee2b9302752c2094015bcca9a006561805fbe93f178e163e47501bc3c2c120cb8469a7985d69533020f9d736e6409e31fdc1084e279f4d
-
Filesize
7KB
MD51687e4430649fdd4fde98a120f992836
SHA1fd7227e15928bee5335772cd72dba0047f6d06ce
SHA2565b0d7eec5ae0f5af562ec02611dbaadbfba6b308ba0345cb19b30a0a84f937a7
SHA512a6c3b0db67a4f27a37ee2b9302752c2094015bcca9a006561805fbe93f178e163e47501bc3c2c120cb8469a7985d69533020f9d736e6409e31fdc1084e279f4d
-
Filesize
219KB
MD592defcf3ee31db03999e8ea41742f8f8
SHA12d5a94c029e1ac0df07a2055f03ca3d77ceb76b6
SHA256d3873ec8cf9a80b3b5691445cd0f6d2a38f5a2432864d7fa372b751bad54e891
SHA512d58f4c6bf526ed5e19bbb9c36db8fa192c63eb770b8bb5cebef0e1baf69d35ec3e1367062b9d2af9aa654d97e9cdcecca9c12bc73d9097c38a9c7e6dc11f103a
-
Filesize
3.5MB
MD5f76b1d2cd95385b21e61874761ddb53a
SHA1e5219dc55dcd6b8643e3920ad21d0640fd714383
SHA2568bf0eeb5081d8397e2f84f69449c8a80d9c0cdcf82bcef7a484309046adcb081
SHA5128e5c6541bbea6730c4f6392439454f516d56ac9ad6d6b55336e52361cc80a35fbed8a90d58020d92fa4ac9fcfeee6c280754a9e99cc32bae901b00306626e69f
-
Filesize
2.4MB
MD5a3c9b29774425f6e3e199c1bad32ab3d
SHA1e0851dd24deef3352d2c3f651163d208c3ab0df6
SHA256ff17bd3f171b30309a7cd36b47af4d6536c7b6a26d7b99f7c8a06c9c50387251
SHA512022c5f6c2ffae13fddd982876edd79662a9dc3c59300cf6a37303a691de9c14be123ea601955173b20fd4f1d4019ae042a681d6fa006615226b314f382c02ab0
-
Filesize
2.4MB
MD5a3c9b29774425f6e3e199c1bad32ab3d
SHA1e0851dd24deef3352d2c3f651163d208c3ab0df6
SHA256ff17bd3f171b30309a7cd36b47af4d6536c7b6a26d7b99f7c8a06c9c50387251
SHA512022c5f6c2ffae13fddd982876edd79662a9dc3c59300cf6a37303a691de9c14be123ea601955173b20fd4f1d4019ae042a681d6fa006615226b314f382c02ab0
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
2.0MB
MD58fc7b5ede33bd0c9383e192dd9cd6293
SHA1d649304001bca369eb71443b1be3d279f231aa97
SHA2565140abe33c79ded61f11fd2945f5baef3d48024cc29e8877b6c571045ab91bac
SHA5125d7f23ff2147d1b005f0941c3ebb3de5f35eae4fa72e2566ab7751b5cf04543676e6f680c85b183f6995f2ca9fa455a9ab446062db054c778a83ca31dbe98847
-
Filesize
639KB
MD5f9584dcc12af247be531f348c856f65a
SHA16c78561f7641a0a68a3a668e45a4d72962ffd878
SHA2565d1dc0f08500369842b83750a07d3dd0230b3246c492784b5cb26cba2c4a40d4
SHA51255f611be62ca6e2cf9736bd8b68d0a0c7a5468d650e96863bd3322e7d5e845887313b8e45125d9e1a9608a455726fc769f01049d47e983a5aeebc910555e79d7
-
Filesize
790KB
MD5498133d9ffbdee7d8996cbd4cbd944da
SHA1eb26f9e98509931e22c18c2a469a698bfef0b5fd
SHA256b362be1e8853b97afb22d6611b6c480127ef7a478c79d8ef7b3cbc070e4abaab
SHA512a2ccd21ce6302f7552f31217aeebd6a7399eac9829d0240346bc0512bad940a2f04108fccb821e13c43b18f6f0a665d3bda25da6099b899d699b60082074ddf2
-
Filesize
1.7MB
MD579213c18bddffae6044263d883464200
SHA1711ed6d95e1de97eda384aab9b9b102d7718641e
SHA256858eceabe965e0dbe74b12d4403b9ad0fb1e23248bb2b0250f8d42e6229f7bb4
SHA5126a172b56213926c6dc18afcb1d10c8e4d09e8a16cb7209bf0e3cd7f17b25992d0ef17ebb070ea14a684d37e00993b7db79dfddd8500433e99812c2e94f2fe6d7
-
Filesize
788KB
MD56499ea6b92ab4971886bd06c12625819
SHA15ebb75eeca7625b9511233158a02f50a92867a39
SHA2566820f276c0d71557a0c7b997fd2f4a3ac6a45c86454c4dc3bcfa29843b5c470b
SHA512e57703730e42eb9d80e762337e08176705b349f54fbd429edc657d44c9dc3a1f9ccfa594bc3ef622798aebb5bc69b225abb266b00f9b350ae59f734c2f31f63d
-
Filesize
169B
MD54b9d2592861d32793e2a16ed9a5d6be7
SHA1750b188ed6249f310d0da9d25d44327beec8dded
SHA256644d22e2189d0ff6d982c107aba735fd5618c8be9c3f8650e9ec56d44928a121
SHA512209d0ad484279f0875ade82ddc81acf3ae55b128763a776e3ae18d639da22590636cfe6d2967387e2b4c2a7c4e6e0ec174a1bb9590332e5936c1e5318b325e0e
-
Filesize
4KB
MD56c5369f4b9a30dae7ee3f0bec07a1018
SHA1223fe90fb0df218d1998455808a6469c9e4d2443
SHA256b8e98b21c3b3af05895051532a862796c8f8a78404cac0b3189af90a37db2d87
SHA5120306a65932ae0b4a1b146f4eb6d56acdc21acce91dc416e29b52afe40b44fa72e7808e6c61d5a736d7cb37449fe3118786b0e8193c9eae288028cdfb4d23bc1f
-
Filesize
1.7MB
MD5dbe6ef08733bcd191be15a3643a12df3
SHA16a7997549bfb0df16f1cb8bd36884b7eaa12f7a5
SHA256e5613e6c86cfb34bca6650ba7f47cf8c80fb4f83df376fbf6316831cbc287d01
SHA5123bf89ebd97111cfad669f728da701908d4d031af91adf3bea43caa49d0eb5352a66c2cf41c2fc8bc977c30ff2c6abe392f23e3a731f0ffd636e27ae126b2f157
-
Filesize
10.0MB
MD53f019441588332ac8b79a3a3901a5449
SHA1c8930e95b78deef5b7730102acd39f03965d479a
SHA256594637e10b8f5c97157413528f0cbf5bc65b4ab9e79f5fa34fe268092655ec57
SHA512ee083ae5e93e70d5bbebe36ec482aa75c47d908df487a43db2b55ddd6b55c291606649175cf7907d6ab64fc81ead7275ec56e3193b631f8f78b10d2c775fd1a9
-
Filesize
77.1MB
MD596f595b800fe3efc1fd3bcbc1a943e91
SHA16e62f0959302df5c9d56d79ff61d2245136cf3f8
SHA256b59882d9cddfcd4928f4a6be8771fab30ed12dd2a1362573ebcf725772e3b6c6
SHA512cc31c36f4cf0f018444a118ca428d99a16b89cbf1a57a67053cedefe9d9cc50c135f0e79bb0cce5306c56adc5a10112e8db802040be21be070cc3fe9be3d350a
-
Filesize
542KB
MD5297fb973be7238782ac5403e8e664338
SHA1e7658adfd312ac6d2f76f2e2ff3adb6da3f4650b
SHA25697af5f82319aa36113eac81b0b2e38f0a20e78fe0599aa2fcdccb8f89c4bfbb6
SHA51295af9ce48506afa2f5bdb651a59386f8876c99c60de5d5c01b800a15e6d4e4ce04ea8ac849a94be44c77a0a4777afd108e59a14978d55b0a98e72b4db06eeb37
-
Filesize
2.4MB
MD5a3c9b29774425f6e3e199c1bad32ab3d
SHA1e0851dd24deef3352d2c3f651163d208c3ab0df6
SHA256ff17bd3f171b30309a7cd36b47af4d6536c7b6a26d7b99f7c8a06c9c50387251
SHA512022c5f6c2ffae13fddd982876edd79662a9dc3c59300cf6a37303a691de9c14be123ea601955173b20fd4f1d4019ae042a681d6fa006615226b314f382c02ab0
-
Filesize
2.4MB
MD5a3c9b29774425f6e3e199c1bad32ab3d
SHA1e0851dd24deef3352d2c3f651163d208c3ab0df6
SHA256ff17bd3f171b30309a7cd36b47af4d6536c7b6a26d7b99f7c8a06c9c50387251
SHA512022c5f6c2ffae13fddd982876edd79662a9dc3c59300cf6a37303a691de9c14be123ea601955173b20fd4f1d4019ae042a681d6fa006615226b314f382c02ab0
-
Filesize
912KB
MD567e9fdff12286ad0ff11aa7e8a7775d9
SHA1245ec015e953bb395cf5d1e4f54804166daeaf68
SHA256b184f42ad13993a963700ad40400d401e398a46f72056f5907b6acdff986c63d
SHA51242c068e0b157fa5bd9ec9be977c1ec44712fc78909efb64961dc1e34d6c7fccc7af6bb685e847f32da9fe9124a215ad3adea08317279851c8ffd2761a3b47870
-
Filesize
912KB
MD567e9fdff12286ad0ff11aa7e8a7775d9
SHA1245ec015e953bb395cf5d1e4f54804166daeaf68
SHA256b184f42ad13993a963700ad40400d401e398a46f72056f5907b6acdff986c63d
SHA51242c068e0b157fa5bd9ec9be977c1ec44712fc78909efb64961dc1e34d6c7fccc7af6bb685e847f32da9fe9124a215ad3adea08317279851c8ffd2761a3b47870
-
Filesize
912KB
MD567e9fdff12286ad0ff11aa7e8a7775d9
SHA1245ec015e953bb395cf5d1e4f54804166daeaf68
SHA256b184f42ad13993a963700ad40400d401e398a46f72056f5907b6acdff986c63d
SHA51242c068e0b157fa5bd9ec9be977c1ec44712fc78909efb64961dc1e34d6c7fccc7af6bb685e847f32da9fe9124a215ad3adea08317279851c8ffd2761a3b47870
-
Filesize
912KB
MD567e9fdff12286ad0ff11aa7e8a7775d9
SHA1245ec015e953bb395cf5d1e4f54804166daeaf68
SHA256b184f42ad13993a963700ad40400d401e398a46f72056f5907b6acdff986c63d
SHA51242c068e0b157fa5bd9ec9be977c1ec44712fc78909efb64961dc1e34d6c7fccc7af6bb685e847f32da9fe9124a215ad3adea08317279851c8ffd2761a3b47870
-
Filesize
912KB
MD567e9fdff12286ad0ff11aa7e8a7775d9
SHA1245ec015e953bb395cf5d1e4f54804166daeaf68
SHA256b184f42ad13993a963700ad40400d401e398a46f72056f5907b6acdff986c63d
SHA51242c068e0b157fa5bd9ec9be977c1ec44712fc78909efb64961dc1e34d6c7fccc7af6bb685e847f32da9fe9124a215ad3adea08317279851c8ffd2761a3b47870
-
Filesize
912KB
MD567e9fdff12286ad0ff11aa7e8a7775d9
SHA1245ec015e953bb395cf5d1e4f54804166daeaf68
SHA256b184f42ad13993a963700ad40400d401e398a46f72056f5907b6acdff986c63d
SHA51242c068e0b157fa5bd9ec9be977c1ec44712fc78909efb64961dc1e34d6c7fccc7af6bb685e847f32da9fe9124a215ad3adea08317279851c8ffd2761a3b47870
-
Filesize
7KB
MD51687e4430649fdd4fde98a120f992836
SHA1fd7227e15928bee5335772cd72dba0047f6d06ce
SHA2565b0d7eec5ae0f5af562ec02611dbaadbfba6b308ba0345cb19b30a0a84f937a7
SHA512a6c3b0db67a4f27a37ee2b9302752c2094015bcca9a006561805fbe93f178e163e47501bc3c2c120cb8469a7985d69533020f9d736e6409e31fdc1084e279f4d
-
Filesize
7KB
MD51687e4430649fdd4fde98a120f992836
SHA1fd7227e15928bee5335772cd72dba0047f6d06ce
SHA2565b0d7eec5ae0f5af562ec02611dbaadbfba6b308ba0345cb19b30a0a84f937a7
SHA512a6c3b0db67a4f27a37ee2b9302752c2094015bcca9a006561805fbe93f178e163e47501bc3c2c120cb8469a7985d69533020f9d736e6409e31fdc1084e279f4d
-
Filesize
1.3MB
MD5a44554d38b7a25a7ab2320fe731c5298
SHA1c287a88fd3a064b387888f4bbc37a0630c877253
SHA25635980974bdba6d5dd6a4dc1072e33aab77f72f56c46779cb0216e4801dcc36ab
SHA512bd8956b7e8ca6d1129fbbb950dd913183b3e92601c2c900aed26d695782e4663654ac57074e1f0f2efcf9cced969487162910dc9bb52b42572d61994b07f2aad
-
Filesize
1.3MB
MD5a44554d38b7a25a7ab2320fe731c5298
SHA1c287a88fd3a064b387888f4bbc37a0630c877253
SHA25635980974bdba6d5dd6a4dc1072e33aab77f72f56c46779cb0216e4801dcc36ab
SHA512bd8956b7e8ca6d1129fbbb950dd913183b3e92601c2c900aed26d695782e4663654ac57074e1f0f2efcf9cced969487162910dc9bb52b42572d61994b07f2aad
-
Filesize
1.3MB
MD5a44554d38b7a25a7ab2320fe731c5298
SHA1c287a88fd3a064b387888f4bbc37a0630c877253
SHA25635980974bdba6d5dd6a4dc1072e33aab77f72f56c46779cb0216e4801dcc36ab
SHA512bd8956b7e8ca6d1129fbbb950dd913183b3e92601c2c900aed26d695782e4663654ac57074e1f0f2efcf9cced969487162910dc9bb52b42572d61994b07f2aad
-
Filesize
83KB
MD51533d9b2ed991ad4fecef548dc762565
SHA17a0664cc6bdc5ffd23c4aba43fa7b2acdfe949f4
SHA2568e6e874d51f654c1c081cd1658a2e4ad8e3b92e74f9406e8c4eb34d354ab8791
SHA512710677d3c6ebff9da638d22a3ae800eb12ba947aad9acb4e42f9e9268ade1b8dde680b4aa135121851285943aecc0fc9be85c5ca8a269d6857b35e905c7b7c12
-
Filesize
83KB
MD51533d9b2ed991ad4fecef548dc762565
SHA17a0664cc6bdc5ffd23c4aba43fa7b2acdfe949f4
SHA2568e6e874d51f654c1c081cd1658a2e4ad8e3b92e74f9406e8c4eb34d354ab8791
SHA512710677d3c6ebff9da638d22a3ae800eb12ba947aad9acb4e42f9e9268ade1b8dde680b4aa135121851285943aecc0fc9be85c5ca8a269d6857b35e905c7b7c12
-
Filesize
219KB
MD592defcf3ee31db03999e8ea41742f8f8
SHA12d5a94c029e1ac0df07a2055f03ca3d77ceb76b6
SHA256d3873ec8cf9a80b3b5691445cd0f6d2a38f5a2432864d7fa372b751bad54e891
SHA512d58f4c6bf526ed5e19bbb9c36db8fa192c63eb770b8bb5cebef0e1baf69d35ec3e1367062b9d2af9aa654d97e9cdcecca9c12bc73d9097c38a9c7e6dc11f103a
-
Filesize
219KB
MD592defcf3ee31db03999e8ea41742f8f8
SHA12d5a94c029e1ac0df07a2055f03ca3d77ceb76b6
SHA256d3873ec8cf9a80b3b5691445cd0f6d2a38f5a2432864d7fa372b751bad54e891
SHA512d58f4c6bf526ed5e19bbb9c36db8fa192c63eb770b8bb5cebef0e1baf69d35ec3e1367062b9d2af9aa654d97e9cdcecca9c12bc73d9097c38a9c7e6dc11f103a
-
Filesize
219KB
MD592defcf3ee31db03999e8ea41742f8f8
SHA12d5a94c029e1ac0df07a2055f03ca3d77ceb76b6
SHA256d3873ec8cf9a80b3b5691445cd0f6d2a38f5a2432864d7fa372b751bad54e891
SHA512d58f4c6bf526ed5e19bbb9c36db8fa192c63eb770b8bb5cebef0e1baf69d35ec3e1367062b9d2af9aa654d97e9cdcecca9c12bc73d9097c38a9c7e6dc11f103a
-
Filesize
219KB
MD592defcf3ee31db03999e8ea41742f8f8
SHA12d5a94c029e1ac0df07a2055f03ca3d77ceb76b6
SHA256d3873ec8cf9a80b3b5691445cd0f6d2a38f5a2432864d7fa372b751bad54e891
SHA512d58f4c6bf526ed5e19bbb9c36db8fa192c63eb770b8bb5cebef0e1baf69d35ec3e1367062b9d2af9aa654d97e9cdcecca9c12bc73d9097c38a9c7e6dc11f103a
-
Filesize
219KB
MD592defcf3ee31db03999e8ea41742f8f8
SHA12d5a94c029e1ac0df07a2055f03ca3d77ceb76b6
SHA256d3873ec8cf9a80b3b5691445cd0f6d2a38f5a2432864d7fa372b751bad54e891
SHA512d58f4c6bf526ed5e19bbb9c36db8fa192c63eb770b8bb5cebef0e1baf69d35ec3e1367062b9d2af9aa654d97e9cdcecca9c12bc73d9097c38a9c7e6dc11f103a
-
Filesize
219KB
MD592defcf3ee31db03999e8ea41742f8f8
SHA12d5a94c029e1ac0df07a2055f03ca3d77ceb76b6
SHA256d3873ec8cf9a80b3b5691445cd0f6d2a38f5a2432864d7fa372b751bad54e891
SHA512d58f4c6bf526ed5e19bbb9c36db8fa192c63eb770b8bb5cebef0e1baf69d35ec3e1367062b9d2af9aa654d97e9cdcecca9c12bc73d9097c38a9c7e6dc11f103a
-
Filesize
2.4MB
MD5a3c9b29774425f6e3e199c1bad32ab3d
SHA1e0851dd24deef3352d2c3f651163d208c3ab0df6
SHA256ff17bd3f171b30309a7cd36b47af4d6536c7b6a26d7b99f7c8a06c9c50387251
SHA512022c5f6c2ffae13fddd982876edd79662a9dc3c59300cf6a37303a691de9c14be123ea601955173b20fd4f1d4019ae042a681d6fa006615226b314f382c02ab0
-
Filesize
6.0MB
MD59b248dfff1d2b73fd639324741fe2e08
SHA1e82684cd6858a6712eff69ace1707b3bcd464105
SHA25639943c30732988289ca346902f007a72124bd98b82e08b0b9739241cdab4018e
SHA51256784a895f113088e3c92ccd96f354473e5d849fb9d0798868ff5e9477f60854e8bc7c9759c63417c9298f8702abab266722439b445977c6e940da393b8b696c
-
Filesize
788KB
MD56499ea6b92ab4971886bd06c12625819
SHA15ebb75eeca7625b9511233158a02f50a92867a39
SHA2566820f276c0d71557a0c7b997fd2f4a3ac6a45c86454c4dc3bcfa29843b5c470b
SHA512e57703730e42eb9d80e762337e08176705b349f54fbd429edc657d44c9dc3a1f9ccfa594bc3ef622798aebb5bc69b225abb266b00f9b350ae59f734c2f31f63d
-
Filesize
788KB
MD56499ea6b92ab4971886bd06c12625819
SHA15ebb75eeca7625b9511233158a02f50a92867a39
SHA2566820f276c0d71557a0c7b997fd2f4a3ac6a45c86454c4dc3bcfa29843b5c470b
SHA512e57703730e42eb9d80e762337e08176705b349f54fbd429edc657d44c9dc3a1f9ccfa594bc3ef622798aebb5bc69b225abb266b00f9b350ae59f734c2f31f63d
-
Filesize
788KB
MD56499ea6b92ab4971886bd06c12625819
SHA15ebb75eeca7625b9511233158a02f50a92867a39
SHA2566820f276c0d71557a0c7b997fd2f4a3ac6a45c86454c4dc3bcfa29843b5c470b
SHA512e57703730e42eb9d80e762337e08176705b349f54fbd429edc657d44c9dc3a1f9ccfa594bc3ef622798aebb5bc69b225abb266b00f9b350ae59f734c2f31f63d
-
Filesize
3.5MB
MD5f76b1d2cd95385b21e61874761ddb53a
SHA1e5219dc55dcd6b8643e3920ad21d0640fd714383
SHA2568bf0eeb5081d8397e2f84f69449c8a80d9c0cdcf82bcef7a484309046adcb081
SHA5128e5c6541bbea6730c4f6392439454f516d56ac9ad6d6b55336e52361cc80a35fbed8a90d58020d92fa4ac9fcfeee6c280754a9e99cc32bae901b00306626e69f
-
Filesize
94.8MB
MD5f89dd0bfc180f0dd0db374c31b3a0e83
SHA1ead053af8a17c1af18bfbc850769bbbfd51fe5c1
SHA2569965cfe1a4a20b5b4f83f56c204e8f6a1a6ca08e844a250dfdd9ef735e76eb33
SHA512f1471e0ca64d93de67f7490196a8c8cdca4ae7dce68999dd50434a1e06049540eda2f66c75132813ad5ca97118d23d14568bff7938979386bb44ef6bb5164014
-
Filesize
70.8MB
MD531f0c3ada33a58dd6af2869afbd51fcb
SHA16e5b014d9d53a238e44f9401a04980dc69ba5f92
SHA256e0d49b0876c1a95599d7a351ba1835a2426231dbe326f5e2cd6bd3460d7f9c55
SHA5124ac6913c26064de81701aa2ff9904b3d0f4e2316d176d4f28131c0de5057350ba21383bac5bd99ad94b200b581369d41917a6de1cb2f1372e488ba4ee8c7b147
-
Filesize
47.6MB
MD59ef9a12f59c4f058989a788d2bc6246b
SHA183a0c0c26da1b8dc2ddc370b9bcc24e7e6ecd2da
SHA256c6c805564ea62c143443b39b335b3644c616779dc78146e0efcf66bc3457059f
SHA51211d9457b36553fa131eee37285a602d535854cc9fedb5419578a34e5722922e282d0b9381f00a857da65f09b345ab63c0452682cc02ff2e67e5772151383231b
-
Filesize
2.4MB
MD5a3c9b29774425f6e3e199c1bad32ab3d
SHA1e0851dd24deef3352d2c3f651163d208c3ab0df6
SHA256ff17bd3f171b30309a7cd36b47af4d6536c7b6a26d7b99f7c8a06c9c50387251
SHA512022c5f6c2ffae13fddd982876edd79662a9dc3c59300cf6a37303a691de9c14be123ea601955173b20fd4f1d4019ae042a681d6fa006615226b314f382c02ab0